
o5 L12 - Internal Threats
Authored by Clare Ross
others

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
6 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is an example of a deliberate internal threat?
Visiting untrustworthy websites
Intentional stealing or leaking of information
Unintentional disclosure of data
Downloading from the internet
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Why might an individual seek to override security controls?
To prevent accidental internal threats
To protect the company's data
To improve the efficiency of security controls
To allow a third-party attacker to gain access to the system.
3.
MULTIPLE SELECT QUESTION
30 sec • 3 pts
Which three are examples of an accidental internal threat?
Unintentional disclosure of data
Visiting untrustworthy websites
Use of portable storage devices
Intentional stealing or leaking of information
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a potential risk of using portable storage devices in the workplace?
Unintentional disclosure of data
Downloading from the internet
Accidentally introducing malware to a business system
Visiting untrustworthy websites
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What can be a consequence of downloading from the internet?
Intentional stealing or leaking of information
Infecting the company's system with malware
Unintentional disclosure of data
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What risk can be associated with visiting untrustworthy websites?
Unintentional disclosure of data
Intentional stealing or leaking of information
Being infected by malware or tricked into revealing confidential information
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?